1.888.749.9800

Blog

  • Permalink Gallery

    Business Continuity Plans and Disaster Recovery Plans (Part 2)

Business Continuity Plans and Disaster Recovery Plans (Part 2)

Comprehensive business continuity and disaster recovery plans are must-haves for companies of all sizes that are dependent on their systems to run their businesses. In Part 2 on this topic, I discuss factors that have to be considered when building a plan.

Preparing for a disaster can be a daunting task, involving many factors. A company will have […]

By |August 2nd, 2018|Blog|Comments Off on Business Continuity Plans and Disaster Recovery Plans (Part 2)
  • Permalink Gallery

    Business Continuity Plans and Disaster Recovery Plans (Part 1)

Business Continuity Plans and Disaster Recovery Plans (Part 1)

Comprehensive business continuity and disaster recovery plans are must-haves for companies of all sizes that are dependent on their systems to run their businesses.

The definition of a disaster is anything that can impact the continuation of business operations. Most people think disasters would just include major weather events (snowstorms, hurricanes, flood, and tornadoes), fire, […]

By |July 30th, 2018|Blog|Comments Off on Business Continuity Plans and Disaster Recovery Plans (Part 1)

Q&A On Reconstructing Data After a Disaster

I was recently asked about best practices for a business to reconstruct its data after a disaster by John Edwards, TechTarget. John included my tip noting that once a disaster involving data loss is identified, you must act fast to preserve your environment to prevent further damage, and to protect the archived data itself. Here are some addition […]

By |July 24th, 2018|Blog, Security Breach|Comments Off on Q&A On Reconstructing Data After a Disaster

Three Cyber Security Tips for Small Businesses

There are three critical security controls that all small businesses should implement if they are just starting to address security. These are:

  1. Keep your systems up to date by applying all security updates
  2. Make sure you have daily backups of all critical data and be sure to test the […]
By |June 28th, 2018|Blog|Comments Off on Three Cyber Security Tips for Small Businesses

Data Protection and GDPR

Do you know how your data is being used?

The most important thing an individual can do to understand how their data is used is to limit the information they provide. People by nature desire to be helpful. They click and respond quickly without a thought. Stop and think before you click.

If all of the information […]

By |June 19th, 2018|Blog|Comments Off on Data Protection and GDPR
  • Permalink Gallery

    What Questions Should an SMB Ask When Hiring Outside Cyber Security Help

What Questions Should an SMB Ask When Hiring Outside Cyber Security Help

Choosing the right cyber security consultants for an SMB can feel intimidating, but it doesn’t have to be. You don’t have to know much about cyber security to ask the right hiring questions.

To make an informed decision, an SMB should ask about the consultant’s qualifications, track record, quality of work, breadth of technical services, payment model, and […]

By |May 23rd, 2018|Blog|Comments Off on What Questions Should an SMB Ask When Hiring Outside Cyber Security Help

Top Tips for World Password Day – May 4th

To commemorate World Password Day today, I thought I’d share my top tips for for creating passwords.  They are very basic, but if you follow these guidelines, you will have a added layer of protection for your digital information.

1. A password should not be a dictionary word.

2. A password should not be easily guessable (i.e. “go pats”).

3. A password should not be […]

By |May 4th, 2018|Blog|Comments Off on Top Tips for World Password Day – May 4th

Managing IT Risk (Part 2)

Third Party Risk Management

Following up on my prior post Third Party Risk Management, (4/9/18), I’d like to share my recommendations to monitor and manage IT risk.

There are a number of Governance, Risk, and Compliance (GRC) tools available, ranging from the inexpensive to the extremely expensive. Small to medium size companies are generally […]

By |April 17th, 2018|Blog|Comments Off on Managing IT Risk (Part 2)

Managing IT Risk (Part 1)

Third Party Risk Management

Topping my list of information security risks for the coming year is third party risk management. Small to medium size companies do not have the workforce necessary to monitor the security posture of their technology service providers. To properly address the issue, a company will need to put the following in place and dedicate resources […]

By |April 9th, 2018|Blog|Comments Off on Managing IT Risk (Part 1)

Best Practices for Contracting with Cloud Service Vendors

I was recently asked about best practices for contracting with cloud service vendors – and thought this advice was worth sharing.

What is the best strategy if you decide to change vendors?

Always conduct a parallel transition. This will keep your data in place at your original vendor during the transition. This cost more but will protect […]

By |March 16th, 2018|Blog|Comments Off on Best Practices for Contracting with Cloud Service Vendors
  • Permalink Gallery

    The Shift that EternalBlue May Have Caused Within IT Leadership

The Shift that EternalBlue May Have Caused Within IT Leadership

For leaders in IT, 2017 has been the year of EternalBlue (the weaponized version of the vulnerability described in MS17-010), whether they know it or not.  EternalBlue allowed the trivial exploitation of Microsoft systems allowing an attacker to gain the highest level of system permissions.  This sort of vulnerability set the hacking community on fire and allowed […]

By |February 26th, 2018|Blog|Comments Off on The Shift that EternalBlue May Have Caused Within IT Leadership

How to Prevent a Ransomware Attack

It is always better to be proactively prepared and prevent ransomware attacks than having to react after an attack occurs. Paying the ransom is not recommended.

Law enforcement and IT Security companies have joined forces to disrupt cybercriminal businesses with ransomware connections. The “No More Ransom” website is an initiative by […]

By |February 16th, 2018|Blog, Security Breach|Comments Off on How to Prevent a Ransomware Attack

Intel’s Meltdown and Spectre Vulnerabilities

By now you have probably read some articles about the Meltdown and Spectre vulnerabilities but you may still be seeking guidance for how your organization should react.

First a quick recap, Meltdown and Spectre were announced early in January of 2018. Unlike most other vulnerabilities, Meltdown and Spectre exploit critical vulnerabilities in modern processors. Meltdown primarily […]

By |January 29th, 2018|Blog|Comments Off on Intel’s Meltdown and Spectre Vulnerabilities
  • Permalink Gallery

    Why Phishing and Social Engineering Continue to be so Popular

Why Phishing and Social Engineering Continue to be so Popular

Phishing and social engineering continue precisely because they are so effective!

Sophisticated User: If you are the vice president of customer service and you receive an email purportedly from the Better Business Bureau that contains a link to Complaint #67587 about one of your products, how do you not click through on that embedded link?

By |January 4th, 2018|Blog, Security Breach|Comments Off on Why Phishing and Social Engineering Continue to be so Popular

Cyber Security Trends and Predictions for 2018

I was recently asked my thoughts about cyber security trends for the coming year. Here are a few of my predictions:

  • GDPR requirements will expose data handling issues that greatly exceed expert predictions. Tools will be developed to automate the encapsulation of discovered data into secure cloud based environments.  This will address security and data […]
By |December 11th, 2017|Blog|Comments Off on Cyber Security Trends and Predictions for 2018